Controlled switching method supporting network configurated with Femto base station
A network deployment, femto-gw technology, applied in the field of controlled handover, can solve the problem that CSGFemto base station cannot be used as a handover candidate target base station, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0140] This example is figure 1 As shown, it is used to illustrate the flow chart of the handover preparation stage, including the following situations: the MS triggers or the serving base station triggers the handover process, and the anchor authenticator or the serving base station judges whether the terminal is allowed to access the CSG Femto.
[0141] In step 1, the MS (terminal) initiates a handover request message to the current serving base station (Macro-BS (Serving)). The message includes the selection of the handover candidate target base station by the MS;
[0142] (Step 1 is the handover process triggered by the terminal; if it is a handover process triggered by the serving base station, start directly from step 2)
[0143] Step 2: The serving base station interacts with the anchor authenticator to obtain the AKContext of the target base station (if the handover is triggered by the MS, the target base station is the target base station in the handover request mess...
Embodiment 2
[0156] This example is figure 2 As shown, it is used to illustrate the flow chart of the handover preparation stage, including the following situations: the MS triggers or the serving base station triggers the handover process, and the anchor paging controller or the target base station judges whether the terminal is allowed to access the CSG Femto.
[0157] In step 1, the MS sends a handover request message to the current serving base station. The message includes the selection of the handover candidate target base station by the MS;
[0158] (Step 1 is the handover process triggered by the terminal; if it is a handover process triggered by the serving base station, start directly from step 2)
[0159] Step 2: The serving base station sends a handover request message HO REQ to the target base station (if it is a handover triggered by the MS, the target base station is the target base station in the handover request message sent by the MS to the serving base station, and the...
Embodiment 3
[0178] This example is image 3 Shown is a schematic diagram of the switching execution process
[0179] Step 1: The MS sends a handover instruction message to the serving base station, and the handover instruction message includes the identity of the target base station finally selected by the MS;
[0180] Step 2: The serving base station sends a handover instruction confirmation message HO-Cnf to the selected final target base station; the message contains at least one of the following information: the list of CSG Femto base stations that the terminal user is allowed to access, and the CSG ID that the terminal user is allowed to access List, handover strategy information related to Femto;
[0181] Step 3: After receiving the handover confirmation message HO-Cnf, the target base station sends the handover confirmation confirmation message HO-Ack to the serving base station;
[0182] Step 4: The target base station interacts with the anchor authenticator to obtain the AK Con...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 